Vol. 59, No. 8, 2025
Reconfiguration of the Development Model of an Information Security Management System: Interaction between Core Modules and the Operator
p. 1193 abstract
Study of the Problems of Information-Security Auditing of Geographically Distributed Internet-of-Things Devices
p. 1201 abstract
Predictive Analysis of Information Flows in Information Security Systems of Telecommunication Complexes
p. 1209 abstract
Network Traffic Anonymization in Blockchain Systems Based on Garlic Routing
p. 1217 abstract
Protection of Neural Network Models from Privacy Breach Threats in Federated Learning Using Optimization Methods
p. 1224 abstract
From Exploitation to Protection: Analysis of Attacks on Large Language Models
p. 1230 abstract
Trust-Model-Based Method for Protecting Global Models in Federated Learning Systems
p. 1242 abstract
Generalized Method for Comparative Analysis of Fuzz-Testing Tools
p. 1253 abstract
Automated Method for Evaluating the Correctness of Distributed Algorithms Using Chaos Engineering Testing
p. 1260 abstract
Automated Software Security Analysis for the Android OS
p. 1270 abstract
Fuzz Testing of Closed-Source Software Using Large Language Models
p. 1278 abstract
Automated Security Scanning and Analysis of Container Images
p. 1285 abstract
Analysis of Malware Detection Methods Using Large Language Models and eBPF Technology
p. 1292 abstract
Method for Detecting Latent Vulnerabilities at the Final Stage of Software Development
p. 1300 abstract
Detection of Potentially Malicious Activities in CI/CD Pipelines Based on Build Agent Behavior Analysis
p. 1307 abstract
Memory-Based Covert Channels in the TLS Protocol
p. 1315 abstract
Ensuring Byzantine Fault Tolerance of a Distributed Ledger in a Smart City Based on a Trust Model
p. 1322 abstract
Model of Interaction of Mobile Ad Hoc Network Nodes Taking into Account Protection against Active Network Attacks
p. 1328 abstract
Detection of Honeypot Systems Based on a Comprehensive Analysis of Node Performance Indicators
p. 1338 abstract
Detecting the Spread of False News Content Using Machine Learning
p. 1345 abstract
Application of a Genetic Algorithm for Selecting Neural Network Hyperparameters
p. 1357 abstract
Combination of Methods for Selective Teacher Intervention in the Student’s Learning Process and Low-Rank Adaptation in the Knowledge Distillation Models
p. 1364 abstract
Multisignature on Isogenies of Elliptic Curves with Participant Masking and Authentication
p. 1371 abstract
On the Applicability of the Chi-Square Statistic in the Problem of Determining the Parameters of Block Encryption Algorithms
p. 1377 abstract
Lattice-Based Commitment Scheme for Proving Linear Relations between Hidden Values
p. 1387 abstract
Key Pre-Distribution Technique Using Shamir’s Secret Sharing Scheme
p. 1395 abstract
Method for Predicting the Correlation Properties of Marker Bipolar Sequences in Digital Watermarking Using the Patchwork Method
p. 1403 abstract
Countering Illegitimate Activations of a Smart Voice Assistant
p. 1415 abstract
Study of Adversarial Attacks on Classical Machine Learning Models in the Context of Network Threat Detection
p. 1426 abstract
Application of Convolutional Neural Networks to Increase the Security Level of Steganographic Methods
p. 1440 abstract
Intelligent Data Analysis and Processing for Detecting Insider Data Confidentiality Breaches in a DBMS
p. 1448 abstract
Using Entropy Metrics to Detect Data Integrity Attacks in Real Time
p. 1457 abstract
Optimization of Data Obfuscation in Big Data Processing and Storage Systems
p. 1464 abstract
Construction of a Semantic Space of Intentionalities Using Generative Pretrained Models to Solve the Problem of Spam Filtering
p. 1475 abstract
Protecting Smart City Blockchain Systems from Selfish Mining Attacks
p. 1484 abstract
Ensuring the Cybersecurity of the Functional Network of CII Facilities Using the Optimal Honeypot Node Deployment Strategy
p. 1491 abstract
Optimization of a Search Information System in a Database of Directive Documents
p. 1497 abstract
Analysis of the Potential for Using Biometric Characteristics to Identify Insider Threats Based on Psycho-Emotional State
p. 1504 abstract
Architecture of a Software System for Protecting Wireless Ad Hoc Networks from Active Network Attacks
p. 1512 abstract
Artificial Immunization in Hierarchical and Peer-to-Peer Networks to Protect Against Cyber Threats
p. 1519 abstract
Protection of DevOps Pipelines: Automation of Security within DevSecOps
p. 1527 abstract
Application of Large Language Models in the Problem of Event Forecasting
p. 1536 abstract